Page 6 - 2105
P. 6

(Continued from page 4)                                Google for the same message, or a key phrase from
                                                                that message. (highlight, right-click, search Google).
                                                                You'll often see that many other people have re-
         font and type size for easy reading.  Thus, the reading
         limitations of a phone or small tablet are offset by the   ceived the same or similar fraudulent message.

         increased legibility that Libby provides for articles you
         choose to read.

         There are 423 different magazines in the “Tech and
         Gaming” category, so you are sure to find some that will
         interest you – whether you are into Windows PCs, Macs,
         iPads, Linux, iPhones, or Android.  Pay Libby a visit!






                                                                Would-be cybercriminals using social engineering
                                                                methods are very opportunistic. For example, this
         Phil
                                                                time of the year the names of shopping websites
                                                                such as Amazon and Mayfair are used in sending
                                                                out millions of emails claiming issues with your ac-
         (Continued from page 5)                                count or recent order and asking for personal infor-
                                                                mation. They know consumers are most likely to
         tached files – once they are opened, these attach-     have made purchases this time of the year.
         ments can install malware to give someone else
         control over your computer. They can then initiate     The scammer wants to panic you into doing some-
         attacks on other computers, including by sending       thing. Don’t be threatened by an email. Does the
         spam (often infected) to every contact in your ad-     message urgently ask for help or otherwise appeal
         dress book.                                            to your emotions?  These are common techniques.
                                                                Do not respond to an email threatening to suspend
         Watch for poor English                                 your account if you do not answer in a short time.
         Poor grammar or words used in an unusual way are
         possible indications of phishing. Always be suspi-     Homoglyph attacks
         cious; looking for unusual language and vocabulary,    Homoglyph attacks rely on replacing characters in
         or misspelled words can help prevent you from be-      addresses with ones that look similar, or are the
         coming the next victim. Poor spelling and other        same, but belong to different alphabets. These at-
         grammar mistakes are common with phishing emails       tacks are extremely dangerous for users because
         that have been translated from other languages.        there is a very limited chance of detecting the trick.
         This kind of clue is less common today because the     Like the attack on PayPal users in which the ad-
         quality of social engineering has improved, so you     dress contained the “correct letters” taken from our
         are likely to receive a more professional presenta-    Latin alphabet – with two exceptions. The attackers
         tion. Another thing that can signal an attempted at-   replaced both instances of the letter P with a “P”
         tack is generic greetings such as "Dear recipient" or   look-alike letter, but from a different alphabet. This
         " Dear friend".                                        “P” look-alike letter was taken from the Russian al-
                                                                phabet, where it is equivalent to the letter R. With
         There’s sometimes a purpose behind misspellings        this kind of attack, you are dependent on the other
         and poor syntax. Cybercriminals most successfully      clues discussed in this article to protect yourself.
         prey on uneducated computer users, knowing them
         to be less observant and therefore easier targets.
                                                                                     David Kretchmar
                                                                                     Computer Technician
         Is it too good to be true or is it frightening?                             Sun City Summerlin Computer
         Social engineering focuses on two human weak-                               Club
         nesses, fear and greed. Does the email promise you                          https://www.scscc.club
         a windfall of cash?  Does it suggest you inherited a                        dkretch (at) gmail.com
         fortune or will be paid a fortune to help someone
         move money out of their country?  Here’s an idea:


         May 2021                                             6
   1   2   3   4   5   6   7   8   9   10   11